Sold Out
Book Categories |
Acknowledgments | xiii | ||
Introduction | xvii | ||
Part 1 | Exploring the World of Covert Communication | 1 | |
Chapter 1 | Covert Communication: It's All Around You | 3 | |
What Is Steganography? | 5 | ||
Where Hidden Data Hides | 5 | ||
Where Did It Come From? | 6 | ||
Where Is It Going? | 7 | ||
When Steganography Inspires Terror | 8 | ||
Who Is Using Stego? | 9 | ||
Protecting Your Rights | 10 | ||
Keeping Your Business Secure | 10 | ||
Looking Ahead | 12 | ||
Chapter 2 | Cryptography Explained | 13 | |
Cryptography Defined | 15 | ||
Crypto 101 | 15 | ||
Crypto Lingo | 16 | ||
Early Cryptography | 17 | ||
How We Got to Modern Cryptography | 18 | ||
Cryptography and Network Security | 19 | ||
Confidentiality | 19 | ||
Integrity | 20 | ||
Availability | 21 | ||
Authentication and Non-Repudiation | 22 | ||
Authentication | 22 | ||
Non-repudiation | 23 | ||
Principles of Cryptography | 24 | ||
You Cannot Prove Crypto Is Secure | 24 | ||
Algorithm versus Implementation | 25 | ||
Never Trust Proprietary | 26 | ||
The Strength of an Algorithm Is in the Key | 28 | ||
Cryptography Stays in Place | 28 | ||
Cryptography Must Be Designed In | 29 | ||
All Cryptography Is Crackable, in Time | 29 | ||
Security Becomes Obsolete | 31 | ||
Types of Cryptography | 32 | ||
Symmetric | 32 | ||
Diffie-Hellman Key Exchange | 32 | ||
Common Implementations of Symmetric Encryption | 34 | ||
Asymmetric | 38 | ||
Hash | 38 | ||
Putting the Pieces Together | 39 | ||
Using Cryptography Tools | 40 | ||
Working with PGP | 41 | ||
Generating a Privacy Key with PGP | 41 | ||
How PGP Works with Email | 44 | ||
Using SSH | 45 | ||
Looking Ahead | 50 | ||
Chapter 3 | Hiding the Goods with Steganography | 51 | |
Overview of Steganography | 52 | ||
The Growth of Steganography | 53 | ||
Steganography in Use | 54 | ||
Flaws of Steganography | 55 | ||
Variations on Stego | 56 | ||
Trojan Horses | 56 | ||
Covert Channels | 57 | ||
Easter Eggs | 58 | ||
Hardware Keys | 58 | ||
Security and Steganography | 59 | ||
Confidentiality | 59 | ||
Survivability | 59 | ||
No Detection | 60 | ||
Visibility | 60 | ||
Principles of Steganography | 61 | ||
Types of Steganography | 61 | ||
File Type | 61 | ||
Method of Hiding | 62 | ||
Hands-on Steganography | 62 | ||
Putting All the Pieces Together | 63 | ||
Looking Ahead | 66 | ||
Chapter 4 | Digital Watermarking | 67 | |
What Is Digital Watermarking? | 68 | ||
Exploring Uses for Digital Watermarking | 69 | ||
Properties of Digital Watermarking | 71 | ||
Types of Digital Watermarking | 73 | ||
Invisible Watermarking | 74 | ||
Visible Watermarking | 77 | ||
Goals of Digital Watermarking | 78 | ||
Digital Watermarking and Stego | 79 | ||
Uses of Digital Watermarking | 80 | ||
Removing Digital Watermarks | 81 | ||
Looking Ahead | 87 | ||
Part 2 | The Hidden Realm of Steganography | 89 | |
Chapter 5 | Steganography at Large | 91 | |
The Internet: A Climate for Deceit | 93 | ||
The End of the Paper Trail | 93 | ||
Your Jurisdiction or Mine? | 94 | ||
Searching for Identity | 95 | ||
Corporate Espionage | 97 | ||
Who's Playing? | 97 | ||
Information Attacks | 98 | ||
System Attacks | 99 | ||
Playing Spy | 99 | ||
Big Brother--With an Attitude | 99 | ||
Information Crime and the Law | 101 | ||
Who's Watching Whom? | 101 | ||
Protecting Ideas | 101 | ||
Enforcement: A Tough Nut | 102 | ||
The Challenge | 103 | ||
Enforcing the Unenforceable | 103 | ||
The Growing Science of Computer Forensics | 104 | ||
Looking Ahead | 105 | ||
Chapter 6 | Nuts and Bolts of Steganography | 107 | |
Types of Steganography | 108 | ||
Original Classification Scheme | 109 | ||
Insertion-Based | 109 | ||
Algorithmic-Based | 109 | ||
Grammar-Based | 110 | ||
New Classification Scheme | 111 | ||
Insertion-Based | 111 | ||
Substitution-Based | 112 | ||
Generation-Based | 112 | ||
Color Tables | 113 | ||
Products That Implement Steganography | 114 | ||
S-Tools | 115 | ||
Using S-Tools with Image Files | 115 | ||
Using S-Tools with Sound Files | 116 | ||
S-Tools Step-by-Step | 117 | ||
Hide and Seek | 118 | ||
J-Steg | 119 | ||
EZ Stego | 121 | ||
Image Hide | 122 | ||
Digital Picture Envelop | 123 | ||
Camouflage | 126 | ||
Gif Shuffle | 127 | ||
Spam Mimic | 127 | ||
Rolling Your Own Stego | 129 | ||
Comprehensive Stego Program | 130 | ||
Technique Structure | 132 | ||
WAV Creation | 132 | ||
Overview | 132 | ||
Idea | 133 | ||
Details | 133 | ||
Logic Flow | 134 | ||
Areas for Improvement | 135 | ||
wav-Sine Creation | 135 | ||
Overview | 135 | ||
Idea | 135 | ||
Details | 135 | ||
Logic Flow | 135 | ||
Areas for Improvement | 136 | ||
WAV Twiddle | 137 | ||
Overview | 137 | ||
Idea | 137 | ||
Details | 137 | ||
Logic Flow | 137 | ||
Areas for Improvement | 139 | ||
Doc Stuffer | 139 | ||
Overview | 139 | ||
Idea | 139 | ||
Details | 139 | ||
Logic Flow | 140 | ||
Areas for Improvement | 141 | ||
EXE Stuffer | 141 | ||
Overview | 142 | ||
Idea | 143 | ||
Details | 143 | ||
Logic Flow | 143 | ||
Areas for Improvement | 143 | ||
HTML White Space | 144 | ||
Overview | 145 | ||
Idea | 145 | ||
Details | 145 | ||
Logic Flow | 147 | ||
Areas for Improvement | 147 | ||
HTML White Space Variable | 147 | ||
Overview | 147 | ||
Idea | 148 | ||
Details | 149 | ||
Logic Flow | 149 | ||
Areas for Improvement | 149 | ||
RTF Insertion | 149 | ||
Overview | 149 | ||
Idea | 150 | ||
Details | 151 | ||
Logic Flow | 151 | ||
Areas for Improvement | 151 | ||
War | 151 | ||
Overview | 151 | ||
Idea | 151 | ||
Details | 152 | ||
Logic Flow | 153 | ||
Areas for Improvement | 153 | ||
Looking Ahead | 153 | ||
Chapter 7 | Sending Stego Files Across a Network | 155 | |
Uses and Techniques of Network Stego | 155 | ||
Hiding in Network Traffic | 156 | ||
Stego Combined with Viruses | 156 | ||
Tracking Internet Usage | 156 | ||
Network Stego Techniques | 157 | ||
Hiding in an Attachment | 157 | ||
Hiding Data in an Email Attachment | 157 | ||
Transmitting Hidden Data with FTP | 157 | ||
Posting Stego to a Web Site | 158 | ||
Hiding in a Transmission | 158 | ||
Using Invisible Secrets to Hide and Transmit Data | 158 | ||
Embedding Hidden Data with Invisible Secrets | 159 | ||
Decrypting and Extracting Data with Invisible Secrets | 164 | ||
CameraShy | 167 | ||
Hiding Data in Network Headers | 169 | ||
Networking and TCP/IP: The Basics | 169 | ||
Using IP and TCP Headers for Stego | 169 | ||
UDP and ICMP Headers | 171 | ||
Covert TCP | 171 | ||
How Covert TCP Works | 172 | ||
Running Covert TCP | 173 | ||
Hiding in an Overt Protocol | 179 | ||
Looking Ahead | 181 | ||
Part 3 | Making Your Own Communications Secure | 183 | |
Chapter 8 | Cracking Stego and Crypto | 185 | |
Who's Cracking What? | 186 | ||
Cracking Analysis | 187 | ||
Cryptanalysts | 187 | ||
Steganalysts | 188 | ||
The Role of Detection | 188 | ||
Detecting Encryption | 188 | ||
Randomness and Compression | 190 | ||
Detection and Image Files | 190 | ||
Building a Program for Detection | 191 | ||
Cracking Cryptography | 194 | ||
General Attacks | 195 | ||
Ciphertext-Only Attack (COA) | 195 | ||
Known Plaintext Attack (KPA) | 196 | ||
Chosen Plaintext Attack (CTA) | 197 | ||
Chosen Ciphertext Attack (CCA) | 197 | ||
Specific Attacks | 197 | ||
Brute-Force Attack | 197 | ||
Replay Attack | 198 | ||
Man-in-the-Middle Attack | 199 | ||
Meet-in-the-Middle Attack | 199 | ||
Birthday Attack | 200 | ||
Cracking Steganography | 201 | ||
Specific Techniques | 201 | ||
S-Tools Version 4.0 | 202 | ||
Hide and Seek | 205 | ||
J-Steg | 205 | ||
EZ Stego | 207 | ||
StegDetect | 208 | ||
General Techniques for Detecting Stego | 211 | ||
Looking Ahead | 216 | ||
Chapter 9 | Developing Your Secure Communications Strategy | 217 | |
Secure versus Secret | 218 | ||
Setting Communication Goals | 219 | ||
The Roles of Crypto and Stego in Business | 220 | ||
Why You Need Both Stego and Crypto | 220 | ||
Crypto and Stego in Business Today |
Title: Hiding in plain sight Manufacturer: WileyWiley Item Number: 9780471444497 Number: 1 Product Description: Hiding in plain sight Universal Product Code (UPC): 9780471444497 WonderClub Stock Keeping Unit (WSKU): 9780471444497 Rating: 4.5/5 based on 2 Reviews Image Location: https://wonderclub.com/images/covers/44/97/9780471444497.jpg Weight: 0.200 kg (0.44 lbs) Width: 7.380 cm (2.91 inches) Heigh : 9.220 cm (3.63 inches) Depth: 0.780 cm (0.31 inches) Date Added: August 25, 2020, Added By: Ross Date Last Edited: August 25, 2020, Edited By: Ross
|